共 20 条
[1]
[Anonymous], 2007, P 22 AAAI C ART INT
[2]
Bleikertz S, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P47
[3]
Comparative Evaluation of Anomaly Detection Techniques for Sequence Data
[J].
ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS,
2008,
:743-+
[4]
Chen SF, 1996, P 34 ANN M ASS COMP, P310, DOI DOI 10.3115/981863.981904
[6]
Manning C., 1999, FDN STAT NATURAL LAN
[7]
Nagao M., 1994, Proceedings of the 15th conference on Computational linguistics, V1, P611
[9]
Decentralized failure diagnosis of discrete event systems
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2006, 36 (02)
:384-395
[10]
Rintanen J, 2007, 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P532